Methods for Adaptive Resource Availability Management of Geoinformation Systems under Destructive Impacts

Author:

Gryzunov V.1ORCID

Affiliation:

1. Russian State Hydrometeorological University

Abstract

The complexity of ensuring the availability of geoinformation systems resources is due to the volatile structure of the system, the uncertainty of user tasks and destructive influences. This paper proposes methods that allow to halve the probability of information security risk associated with the disruption of resource availability. The effect is achieved by: 1) preserving the required probability of achieving the activity goal of the identification system, regardless of the strength of disruptive influences; 2) by aggregating the performance of individual physical system elements into virtual pools; and 3) by converting internal user task reserves into performance reserves. The performance of the methods was evaluated using a simulation model developed in MATLAB environment.

Publisher

Bonch-Bruevich State University of Telecommunications

Reference37 articles.

1. Voronin A.V., Zatsarinny A.A. Geoinformation system as the most important component of management decision making system. Sistemy vysokoy dostupnosti. 2019;15(3):27−33. (in Russ.) DOI:10.18127/j20729472-201903-02

2. Lisitsky D.V., Katsko S.Yu. User segment of unified territorial geoinformation environment. Vestnik of SSUGT. 2016;4(36):89‒99 (in Russ.)

3. Gryzunov V.V. Conceptual model of geoinformation system adaptive control under conditions of destabilization. Information Security Problems. Computer Systems. 2021;1:102‒108. (in Russ.)

4. Gryzunov V., Grishechko A., Sipovich D. Selecting the most dangerous vulnerabilities for prospective information systems for critical applications. Voprosy kiberbezopasnosti. 2022;1(47):66‒75. (in Russ.) DOI:10.21681/2311-3456-2022-1-66-75

5. Danilin G.V., Sokolov S.S., Nyrkov A.P., Knysh T.P. Multiservice networks: methods of increasing data security in the conditions of network attacks. XXI Century: Resumes of the Past and Challenges of the Present plus. 2020;9(2-50):158‒163. (in Russ.) DOI:10.46548/21vek-2020-0950-0028

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. IDENTIFICATION OF INFORMATION SECURITY PROBLEMS BY A SYSTEMATIC LITERATURE REVIEW;Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»;2024-04-13

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3